EP3785463A1 - Method for federating at least two communication networks for mobile terminals and network capable of being federated - Google Patents
Method for federating at least two communication networks for mobile terminals and network capable of being federatedInfo
- Publication number
- EP3785463A1 EP3785463A1 EP19719309.7A EP19719309A EP3785463A1 EP 3785463 A1 EP3785463 A1 EP 3785463A1 EP 19719309 A EP19719309 A EP 19719309A EP 3785463 A1 EP3785463 A1 EP 3785463A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- bubble
- communication
- master
- slave
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 111
- 238000000034 method Methods 0.000 title claims abstract description 26
- 230000006870 function Effects 0.000 claims description 14
- 238000013519 translation Methods 0.000 claims description 10
- 230000037230 mobility Effects 0.000 description 32
- 238000010295 mobile communication Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000004044 response Effects 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000002829 reductive effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 208000019901 Anxiety disease Diseases 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000036506 anxiety Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010248 power generation Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/005—Moving wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
Definitions
- the subject of the invention is a method of federation of at least two communication networks for mobile terminals.
- the field of the invention is in particular that of tactical bubbles. More precisely, the field of the invention is that of the cooperation of at least two communication networks such as tactical bubbles. The field of the invention is also that of the continuity of mobile access in theaters of operations.
- Sensitive mobile communications are, for example:
- intervention forces are understood to mean forces as mentioned above that are required to intervene on a theater of operations to resolve a crisis situation and the need to communicate in a secure manner anywhere is critical for the good resolution of the crisis situation.
- the communications to be secured are in connection with a central orchestrator that protects for example access to a sensitive application. Communications are further performed using encrypted tunnels. This solution allows all known users of the Orchestrator to: - Connect to sensitive applications,
- the response forces have tactical bubbles consisting of an autonomous LTE-type mobile communication network allowing user equipment referenced on this tactical network to communicate with each other in the field autonomously and securely.
- Each bubble has all the equipment of a LTE type mobile telecommunication network, especially the base station of the bubble tactical named eNodeB based on LTE technology, the user database named HSS (Home Subscriber Server) based on LTE technology, PCRF equipment, Packet Data Network Gateway (PGW) and SGW (Serving Gateway) service gateways, Mobility Management Entity (MME) and the Application Function (AF) entity for accessing application servers.
- Each bubble manages its own fleet of user equipment, access to radio resources and the establishment of communications between them and to business applications, through its equipment.
- Each bubble is configured to the most just according to the fleet of user equipment it must accommodate which allows the use of equipment with reduced capacity compared to the equipment of a standard public mobile telecommunication network, thus making them movable and transportable more easily and at a lower cost.
- Each tactical bubble managing its own fleet of user equipment on a radio network of the same nature and the same spectrum a user equipment referenced in a bubble A in the area of coverage of the bubble B will attempt to hang on bubble B without success because it is not referenced on the bubble A and once unhooked from the network of the bubble A it will not be able to reconnect automatically to the latter;
- - Tactical bubbles can have identical configurations set in the factory (HSS with the same name, eNodeB parameterized identically for each bubble), this causes a number of network inconsistencies when these bubbles are located close to each other.
- Each bubble must be provisioned with the total number of user equipment managed by the intervention forces and therefore requires equipment with the highest possible capabilities for each tactical bubble therefore very expensive and more difficult to transport.
- the invention provides an answer to the above problems by allowing to federate one or more bubbles of mobile communication between them when they are close to each other, while:
- a first LTE type network and a second LTE type network can be deployed and connected together so that: - The mobile terminals connected to the two networks can communicate with each other;
- a terminal initially connected to the first network can connect to the second network and does not suffer loss of service or communication.
- the invention therefore allows a handover between two networks that did not know each other a priori (that is to say, for example, two mobile bubbles that do not know their structure a priori).
- At least one of the two networks is a tactical bubble.
- a tactical bubble is a communication network for mobile terminals.
- a tactical bubble is a cellular network with at least one radio cell, a backbone and an application or interface with the outside of the tactical bubble.
- a tactical bubble is intended to be mobile, at least mobile depending on communication needs.
- View of a User Terminal A Tactical Bubble is an LTE (Long Term Evolution for Long Term Evolution) network with a reduced number of base stations, usually one.
- LTE Long Term Evolution for Long Term Evolution
- a tactical bubble represents a mini-network similar to an operator network having a radio interface and allowing access to applications.
- mobile communications is understood to mean communications via smartphone-type mobile terminals using LTE-type or newer communication networks.
- This type includes processing devices using LTE modems.
- This type also includes smart objects connected. In particular, it involves communications via an intermediate infrastructure: the LTE network.
- Each bubble has an orchestrator that allows the federation of tactical bubbles.
- the group communications, video, data, applications are possible in continuity throughout the area covered by the tactical bubbles.
- a law enforcement team for example the GIGN
- a team of civil security forces for example firefighters
- each team retains only access to its specific applications (eg a police database, video servers, etc ...), while allowing the other team to use its communication resources.
- the two tactical bubbles are connected via a dedicated link.
- the bubbles agree on their role.
- a tactical bubble becomes master, the other slave.
- the election of a master bubble can be done according to several criteria, from first come first served, to taking into account the capacities of reception and treatment of each bubble (ie one will elect preferably the bubble capable of managing the most large number of user equipment). This allows, for example, to ensure that all users will be properly managed.
- the orchestrators of each tactical bubble map the transmissions by reconfiguring the networks and the local link.
- the local link between the two tactical bubbles can be established by Wifi, LTE, ie a wireless connection.
- the local link can also be established via Ethernet or Fiber, ie a wired connection connecting the two tactical bubbles.
- the subject of the invention is therefore a method of federation of a first communication network for mobile terminals and of a second communication network for mobile terminals, each communication network comprising a base station, a mobility manager, a gateway of service, a user database, a communication policy manager, a packet gateway each of said networks further comprising a router and an orchestrator, the method comprising the steps of:
- Each communication network has the same addressing scheme, the method comprising a step in which the router of each network is dynamically configured, by the orchestrator of its network, to perform an address translation for one reciprocal between the two. two networks;
- the method comprises the following steps:
- the communications made via the dedicated connection are done using a virtual private network.
- the use, by the slave network, elements of the master network is done by the configuration, in the slave networks of the secondary elements.
- the configuration of the secondary elements is done by naming, the resolution of the names being configured by the orchestrator of the network at the time of the federation.
- a communication network for mobile terminals is a stand-alone network bubble.
- the election of the master orchestrator is done according to the processing capabilities of the bubble to which the orchestrator belongs.
- the invention also relates to a communication network for mobile terminals, said first network, adapted to be federated, with a second communication network for mobile terminals adapted to be federated, a communication network for mobile terminals adapted to be federated comprising a base station, a mobility manager, a service gateway, a user database, a communication policy manager, a packet gateway, each communication network further comprising a router and an orchestrator, said first network of communication being configured to:
- the communication network according to the invention may be an autonomous network bubble. LIST OF FIGURES
- FIG. 1 a functional illustration of tactical bubbles to federate, before federation
- FIG. 2 a functional illustration of tactical bubbles to federate, after federation
- FIG. 5 an illustration of the implementation of the invention for two tactical bubbles, one of which proposes access to an external network
- FIG. 7 an illustration of a federation according to the invention via a network
- FIG. 1 shows a first tactical bubble B-1.
- the networks considered are LTE networks.
- the first tactical bubble B-1 includes:
- a first evolved base station eNB-1 A first evolved base station eNB-1
- MME Mobility Management Entity
- This first service gateway is referenced SGW-1; - A first user database, or HSS for "Home Subscriber Server", ie a central database that contains information about users of the first tactical bubble.
- This first user database is referenced HSS-1;
- PGW Packet Data Network
- a first communication policy manager or PCRF for "Policy and Charging Rules Function", ie a manager that operates in the heart of the network and provides access to subscriber databases and databases. other specialized functions, such as a flow management system.
- This first communication policy manager is referenced PCRF-1.
- each element described designates a device, real or virtual, equipped with data processing and communication capabilities.
- a device executes instruction codes stored in a program memory of said device according to parameters. These parameters are either stored in a data memory of said device, or received during a communication made by said device. It is noted that the same device can fulfill several functions.
- FIG. 1 shows that the first tactical bubble B-1 comprises a first network N-1 for interconnecting the elements of the first bubble.
- the first network allows the establishment of links allowing the various elements to play their roles in the provision of an LTE network via the first base station.
- Such a network is, among other things, described by the 3GPP TS 23.401 standard defining the specifications for the "General Packet Radio Service Enhancements for Evolved Universal Terrestrial Radio Access Network (E-UTRAN) Access” (that is to say the improvements for the General Radio System (GPRS) Enhanced Universal Radio Terrestrial Access Network).
- FIG. 1 also shows: a first link of type S1 -C between the first base station eNB-1 and the first mobility manager MME-1; A first S1-U link between the first eNB-1 base station and the first SGW-1 service gateway;
- FIG. 1 also shows that the first tactical bubble B-1 comprises, connected to the first network N-1:
- a program memory of the first orchestrator includes instruction codes for implementing the method according to the invention described below;
- a first application server referenced AF-1.
- the presence of the first application server corresponds to a variant of the invention in which the first processing bubble has business processing capabilities. From this point of view, the presence or absence of an application server does not diminish or increase the bubble capacity according to the invention to federate. From the point of view of a bubble federation, the presence of an application server is therefore optional.
- a watchdog mechanism consists of performing a message exchange between the two heartbeat orchestrators ("heartbeat") or keeps alive (“keepalive”). After a predefined duration without beat, each orchestrator reconfigures all the equipment of its bubble by performing the reverse path of the federation.
- the master orchestrator performs a restoration of the image of the master user database before federation.
- the first tactical bubble as described is an autonomous network bubble. That is, the first tactical bubble is self-sufficient to allow users to communicate with each other. Such a bubble is more portable, that is to say it can be deployed on any geographical position.
- a tactical bubble is therefore composed of at least one Evolved Packet Core (EPC), for an Evolved Network Core, an HSS / PCRF pair and an eNodeB configured in an omnidirectional LTE cell.
- EPC Evolved Packet Core
- FIG. 2 shows a second tactical bubble B-2 identical to the first tactical bubble.
- the second tactical bubble B-2 includes: - A second evolved base station eNB-2;
- MME-2 A second mobility manager
- SGW-2 A second service gateway
- PGW-2 A second packet gateway
- FIG. 1 shows that the second tactical bubble B-2 has a second N-2 network for interconnecting the elements of the second bubble.
- the second network allows the establishment of links allowing the various elements to play their roles in the provision of an LTE network via the second base station eNB-2.
- Figure 1 also shows:
- Figure 1 also shows that the second tactical bubble has, connected to the second network: - A second orchestrator referenced 0-2,
- a second application server referenced AF-2.
- the remarks made for the first application server are also valid for the second application server.
- the addressing plan of the elements of the second tactical bubble is static and predetermined.
- the two tactical bubbles have the same addressing scheme.
- the communications between the two tactical bubbles are via a network address translation (ie NAT for "Network Address Translation") one for a reciprocal at the routers.
- NAT Network Address Translation
- identical elements Preferably have the same host address but not the same network address.
- NAT rule address translation rule
- the second tactical bubble In an initial state the second tactical bubble has been deployed and flows from the traffic allowing its users to communicate and access the second application server via user equipment connected to the second base station.
- first tactical bubble is deployed to cope with the evolution of the situation.
- This other tactical bubble is the one that has been described as the first tactical bubble.
- the first tactical bubble is in a blocked state, that is to say that it accepts no communication, via the first base station, from users.
- FIG. 3 shows a connection step 1000 in which a dedicated connection is established between the first tactical bubble and the second tactical bubble.
- This dedicated connection can also be described as local.
- This connection is made between the first router and the second router.
- Physically this dedicated connection is either wired or wireless (Wireless in English).
- a wired connection is for example an Ethernet connection
- a wireless connection is for example a Wifi connection.
- this dedicated connection can also be achieved via a third party mobile network.
- the establishment of the dedicated connection detected by the routers is followed by the establishment of an encrypted tunnel between these routers.
- Such a tunnel is called a VPN tunnel.
- All the communications passing through the two routers are encrypted and thus protected against possible interception.
- This is the establishment of a virtual private network 200.
- step 1100 election of a master orchestrator.
- This election follows a mutual discovery. For example, such a discovery between orchestrators can rely on the multicast version of the Internet protocol (IP protocol) and on the notion of clusters (we are talking about also clusters). A multicast IP address is then known to all the bubbles able to federate which allows to join the cluster that self organizes then.
- IP protocol Internet protocol
- clusters we are talking about also clusters.
- the election of a master orchestrator is a process in which the tactical bubble with the master orchestrator becomes the tactical reference bubble of the federated communication network. That is, it is the core network elements of this tactical reference bubble that will contain the entire LTE network configuration obtained by federation. According to different variants one can consider several election criteria:
- a capacity is the maximum number of terminal devices that the bubble can handle simultaneously;
- this address translation is accompanied by the update of the registration d in the name resolution directory to allow the designation of element, for example the user database or the manager. communication policy.
- element for example the user database or the manager. communication policy.
- the database of the master bubble is assigned a name that can be resolved to its translated address.
- An alternative would be to use an address directly. Thanks to this translation and this resolution it is also possible to maintain a continuity of access to application servers regardless of the bubble to which a user equipment is connected.
- each tactical bubble having a unique identifier having a unique identifier
- the value of this identifier is generally used to derive the unique values of the other parameters of the tactical bubble, in particular the translated addresses, the zone identifiers, the unique identifiers of the managers of the tactical bubble. mobilities, ... in the federation. It is therefore a setting by convention.
- This unique identifier is also used during discovery.
- step 1200 of updating the database of the users of the master bubble we go to a step 1200 of updating the database of the users of the master bubble.
- the Orchestrators interact to copy the contents of the user database of the slave bubble into the master bubble's user database. This allows the master tactical bubble to know all the users that can connect. Each user is associated, in the user database, with his or her original bubble. This allows, for example, to return to an initial state of the user database.
- the master orchestrator performs an image backup of the user database before the update step 1200 with the slave bubble database in order to be able to restore the user database in its database. configuration before the implementation of the federation process when the bubbles are caused to no longer be federated.
- the orchestrators also update the configuration of the communication policy manager by merging the configurations of the two communication policy managers.
- the orchestrators configure links, according to the LTE standard, to allow the elements of the two bubbles to work together. These links are established through address translation.
- the orchestrators configure:
- step 1400 update base stations for their cooperation in the federated communication network. That is, the base stations are made to collaborate in a single communication network.
- each base station is updated so that the two base stations can collaborate on a handover.
- Each base station must know at least the "eNodeBID", the PCI and the TAC of the other base station. These elements are known as “neighborhood relations”.
- - eNodeBID base station identifier
- TAC T racking Area Code for tracing area code. It is thus necessary that each base station has a certain number of unique parameters in the future federated network: eNodeBID and PCI (orthogonal PCI to limit the radio interference). In practice the value of these parameters and obtained by convention as previously described.
- This reconfiguration of the secondary elements is done either by declaring in the configurations an address, or a name.
- a name is used which will be solved according to the actions of the preceding steps.
- the preceding steps are in particular the steps of setting up the address translation and updating the name resolution directory records.
- a secondary element is an element that is used, for example, in case of unavailability of a main element.
- step 1500 of configuration of the redundancies the orchestrators cut the links between:
- the slave tactical bubble packet gateway is the communication policy manager of the tactical slave bubble.
- the method according to the invention also comprises a step 1600 for synchronizing mobility managers and service gateways so that they are aware of the existing communication contexts and thus streamline future intercellular transfers.
- This synchronization also makes it possible to declare in each network the service gateways and the mobility managers.
- this step it is necessary to indicate to the mobility managers the existence of the tracing zone of the other bubble as well as the address or the name of the service gateway which serves this zone. tracing.
- the clocks of the two networks are synchronized.
- you can unlock the first tactical bubble ie allow communication via the first tactical bubble.
- an LTE network federation that is to say, allowed two LTE type communication networks, not knowing each other a priori, to function as a single communication network.
- each user with his original tactical bubble can also control access to application servers tactical bubbles and more generally tactical bubble resources. It is therefore possible to prohibit a user with a defined tactical bubble from accessing application servers from another bubble that is not the original tactical bubble.
- all the users of all the federated tactical networks can have access to all the application functions (AF) of all the tactical networks.
- AF application functions
- the users only have access to the application functions of their original tactical network.
- the Orchestrator acts as a proxy for DNS name name resolution queries.
- AF application functions
- a DNS request is transmitted to the orchestrator of the bubble A, which transmits it to an accessible DNS server name resolution server. associated with the bubble A.
- the latter returns the IP address of the server on which the application is hosted to the orchestrator, which sends it back to the user equipment.
- the Orchestrator acts as a DNS proxy, the latter can respond differently per user for each DNS request issued by the user equipment.
- the invention makes it possible to maintain the segmentation of the accesses to the application functions between the user equipments of the bubble A and those of the bubble B.
- a DNS request issued by a user equipment of the bubble A, elected bubble master to the from the federation step will always be treated in the same way as in the case where the bubble is autonomous.
- a DNS request from a bubble B user equipment will initially be sent to the Bubble A Orchestrator who will be able to perform a name resolution to its own DNS server due to the DNS context synchronization performed during the federation or to relay the request to the orchestrator of the slave bubble according to the user equipment that issued the request.
- a federation of communication networks for mobile terminals is a communication network for mobile terminals. It is therefore possible, thanks to the invention to achieve a federation between a federated network and a communication network for mobile terminals.
- the invention is therefore not limited to the federation of two networks. In other words, with the invention, two communication networks for mobile terminals or more can be federated.
- Figure 4 shows the first tactical bubble B-1 and the second tactical bubble B-2 federated in a context of use.
- Figure 4 shows:
- the third user equipment is further out of range of the base station of the first tactical bubble.
- the terminal equipments are smart phones or assimilable devices, that is to say devices capable of connecting to an LTE type network.
- the first user equipment, or the second user equipment can establish communication with the third user equipment, which would be impossible without the invention. He can therefore enjoy the union of radio covers.
- the third mobile equipment was within range of the base station of the first tactical bubble. In this case it could, still thanks to the invention, use the base station of the first tactical bubble to connect to the federated network.
- FIG. 5 is identical to FIG. 4 with in addition a connection between the second tactical bubble and an external network 500, for example the Internet network.
- an external network 500 for example the Internet network.
- the first user terminal and the second user terminal can access the external network.
- FIG. 6 is identical to FIG. 4 with one plus a third federated B-3 tactical balloon with the first tactical balloon B-1 via a dedicated link 600.
- FIG. 6 also shows a fourth user equipment 601 connected to the third tactical balloon B-3.
- the third user equipment 403 can establish a communication with the fourth user equipment 601.
- FIG 7 is identical to Figure 4 except for the dedicated connection that is made via a wireless network.
- it is a network type LTE but in practice it could act as a WiFi network.
- each tactical bubble connects to an LTE network via a base station of said LTE network. A Once these connections established the tactical bubbles can mount the VPN 200 tunnel through these connections.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1853759A FR3080731B1 (en) | 2018-04-27 | 2018-04-27 | FEDERATION PROCESS OF AT LEAST TWO COMMUNICATION NETWORKS FOR MOBILE TERMINALS AND NETWORK SUITABLE TO BE FEDERATED |
PCT/EP2019/060705 WO2019207090A1 (en) | 2018-04-27 | 2019-04-26 | Method for federating at least two communication networks for mobile terminals and network capable of being federated |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3785463A1 true EP3785463A1 (en) | 2021-03-03 |
EP3785463B1 EP3785463B1 (en) | 2022-09-21 |
Family
ID=63294349
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19719309.7A Active EP3785463B1 (en) | 2018-04-27 | 2019-04-26 | Method for federating at least two communication networks for mobile terminals and network capable of being federated |
Country Status (4)
Country | Link |
---|---|
US (1) | US11375387B2 (en) |
EP (1) | EP3785463B1 (en) |
FR (1) | FR3080731B1 (en) |
WO (1) | WO2019207090A1 (en) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2981235B1 (en) * | 2011-10-10 | 2013-10-25 | Cassidian | METHOD OF ATTACHING BETWEEN AT LEAST ONE MOBILE NETWORK AND A REMOTE NETWORK |
US10595242B2 (en) * | 2014-03-07 | 2020-03-17 | Parallel Wireless, Inc. | Federated X2 gateway |
-
2018
- 2018-04-27 FR FR1853759A patent/FR3080731B1/en active Active
-
2019
- 2019-04-26 US US17/050,697 patent/US11375387B2/en active Active
- 2019-04-26 WO PCT/EP2019/060705 patent/WO2019207090A1/en active Application Filing
- 2019-04-26 EP EP19719309.7A patent/EP3785463B1/en active Active
Also Published As
Publication number | Publication date |
---|---|
US20210243615A1 (en) | 2021-08-05 |
FR3080731B1 (en) | 2021-06-04 |
US11375387B2 (en) | 2022-06-28 |
EP3785463B1 (en) | 2022-09-21 |
FR3080731A1 (en) | 2019-11-01 |
WO2019207090A1 (en) | 2019-10-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11271767B2 (en) | Virtual network endpoints for internet of things (IoT) devices | |
FR2907290A1 (en) | METHOD FOR CONFIGURING A ACCESS TERMINAL TO A SERVICE, CONTROLLER, ACCESS NETWORK, ACCESS TERMINAL AND ASSOCIATED COMPUTER PROGRAM | |
EP3698538A1 (en) | Method for toggling of a management entity in a telecommunications network | |
US20230319569A1 (en) | Enhanced interconnection between cellular communication networks | |
EP3785463B1 (en) | Method for federating at least two communication networks for mobile terminals and network capable of being federated | |
EP2399406B1 (en) | Method for switching an access node | |
EP2232816B1 (en) | Management of a communication in a heterogeneous network | |
EP3382996B1 (en) | Communication device and communication network | |
EP2876909B1 (en) | Method for fine location of a mobile user device receiving a call in a telecommunications network using femtocells in open mode | |
FR2965688A1 (en) | MANAGEMENT OF THE TOPOLOGY OF MULTIPLE HETEROGENEOUS ACCESS NETWORKS AND THE BASIC MANAGEMENT OF TOPOLOGY INFORMATION DATA | |
EP4311372A1 (en) | Method for dynamic federation of a plurality of radio networks, related computer program and network | |
EP3672298B1 (en) | Method for federation of two systems, each comprising a private mobile radio communication network infrastructure, associated computer program and federation of two systems, each comprising a private mobile radio communication network infrastructure | |
WO2024166006A1 (en) | Methods and systems for managing connectivity in mesh networks | |
WO2018095954A1 (en) | Selection of a telecommunication infrastructure | |
FR2981235A1 (en) | METHOD OF ATTACHING BETWEEN AT LEAST ONE MOBILE NETWORK AND A REMOTE NETWORK | |
EP3672354B1 (en) | Method for reconfiguring a system comprising a private mobile radio communication network infrastructure, associated computer program and system comprising a private mobile radio communication network infrastructure | |
EP3672315B1 (en) | Installation for private mobile radio communication network, method for forming such an installation and associated computer program | |
EP3747238B1 (en) | Aggregating a plurality of radio connections in a wireless network | |
US20240244421A1 (en) | System and method for unified data repositories and application programming interfaces for avoiding segmentation synchronization | |
WO2024002868A1 (en) | Provision and collection methods, base station, data collection and analysis device, and system | |
FR3016104A1 (en) | COMMUNICATION METHOD IMPLEMENTED BY A RELAY NODE | |
WO2024002866A1 (en) | Communication, management and discovery methods, and devices configured to carry out said methods | |
WO2024002867A1 (en) | Collection of cell deployment information | |
EP3672355A1 (en) | Portable device implementing a private mobile radio communication network infrastructure | |
EP3672356A1 (en) | Method for reducing interference caused by a private mobile radio communication network infrastructure, corresponding computer program and base station of a private mobile radio communication network infrastructure |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20201126 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20220421 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602019019794 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1520571 Country of ref document: AT Kind code of ref document: T Effective date: 20221015 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20220921 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20221221 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1520571 Country of ref document: AT Kind code of ref document: T Effective date: 20220921 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20221222 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230123 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20230121 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602019019794 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
26N | No opposition filed |
Effective date: 20230622 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230426 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20230430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230430 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230430 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230430 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230426 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230426 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20240320 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220921 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240320 Year of fee payment: 6 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240320 Year of fee payment: 6 |